Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
conducts research on the application and the impact of digital technologies like DLT/Blockchain, Digital Identities, Machine Learning/AI, and IoT/5G on organisations from both the private and public sectors
-
within the project AI4TECS Writing a doctoral dissertation in computer science Publishing research findings in leading international conferences and high‑impact journals in AI, machine learning, and
-
conducts research on the application and the impact of digital technologies like DLT/Blockchain, Digital Identities, Machine Learning/AI, and IoT/5G on organisations from both the private and public sectors
-
experience in the following areas: Applied Machine Learning for Autonomous Systems: Experience developing and deploying ML models for perception, prediction, or decision-making in autonomous driving or robotic
-
conducts research on the application and the impact of emerging technologies like DLT/Blockchain, GenAI, Natural Language Processing, Machine Learning, Human-Computer Interaction, and IoT/5G on organisations
-
technologies (fiber-optic sensors, DIC), and computer science (machine learning tools) in collaboration with de department of Physics. The aim of the BriCE project is to develop a novel bridge monitoring
-
approaches - such as machine learning, artificial intelligence, or other data-driven methodologies - will be an asset. This position is part of the University of Luxembourg's tenure-track scheme, which offers
-
conducts research on the application and the impact of digital technologies like DLT/Blockchain, Digital Identities, Machine Learning/AI, and IoT/5G on organisations from both the private and public sectors
-
develop machine‑learning models that learn from and build upon these pNTA results. The successful candidate will be supervised by Prof. Dr. Emma Schymanski and Dr. Federica Piras. For further information
-
Machine Learning (ML) to detect anomalies (such as a new unknown possible entry point) and provide actionable recommendation according to the recovered attack surface. A tool like AMASS[1] from OWASP